IJITCS Vol. 8, No. 10, 8 Oct. 2016
Cover page and Table of Contents: PDF (size: 569KB)
Full Text (PDF, 569KB), PP.22-28
Views: 0 Downloads: 0
Wireless sensor network, Network protocols, network lifetime, dynamic routing, next node, and witness header selection
Wireless sensor network (WSN) has emerged as potential technology for their applications in battlefields, infrastructure building, traffic surveillance, habitat monitoring, health, and smart homes. Unattended nature of these networks makes them vulnerable to variety of attacks, the inherent stringent resources makes conventional security measure infeasible. An attacker can capture a sensor node to install number of clone nodes with same privacy information causing serious security threats and deterioration in network lifetime. Current, security scheme along with distinct advantages suffer from number of limitations. A good counter attacks measure should not only cater for security and energy-efficiency but network lifetime as well. In this paper, we propose a next-node selection method which consider residual energy and clone attacks ratio in addition to distance, in order to overcome the limitation of fixed path based shortest routing. These factors are also considered while selecting the witness header in WSNs. Results demonstrate the efficacy of the proposed schemes in terms of network lifetime.
Muhammad K. Shahzad, Quang-Ngoc Phung, "Witness-Header and Next-Node Selection to Extend Network Lifetime in Energy-Efficient Clone-Node Detection in WSNs", International Journal of Information Technology and Computer Science(IJITCS), Vol.8, No.10, pp.22-28, 2016. DOI:10.5815/ijitcs.2016.10.03
[1]Zhongming Zheng, Anfeng Liu, Lin X. Cai, Zhigang Chen, and Xuemin (Sherman) Shen, “ERCD: An Energy-Efficient Clone Detection Protocol in WSNs,” Proceedings of IEEE INFOCOM, pp. 2436-2444, 2013.
[2]Heesook Choi, Sencun Zhu, Thomas F. La Porta, “SET: Detecting node clones in Sensor Networks,” Third International Conference on Security and Privacy in Communication Networks, SecureComm, pp. 341-350, 2007.
[3]Wazir Zada Khan, Mohammed Y. Aalsalem, Mohammed Naufal Bin Mohammed Saad, and Yang Xiang, “Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey,” pp. 1-22, vol. 2013, 2013.
[4]Zhijun Li, Member and Guang Gong, “On the Node Clone Detection in Wireless Sensor Networks,” IEEE/ACM TRANSACTIONS ON NETWORKING, pp. 1799-1811, vol. 21, no. 6, December 2013
[5]Bryan Parno, Adrian Perrig and Virgil Gligor, “Distributed Detection of Node Replication Attacks in Sensor Networks,” IEEE Symposium on Security and Privacy, pp. 49-63, 2005
[6]R.Sathish, and D.Rajesh Kumar, "Dynamic Detection of Clone Attack in Wireless Sensor Networks," International Conference on Communication Systems and Network Technologies, IEEE Computer Society, pp. 501-505, 2013
[7]Mauro Conti, Roberto Di Pietro, Luigi Vincenzo Mancini, and Alessandro Mei, "Distributed Detection of Clone Attacks in Wireless Sensor Networks," IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, pp. 685-698, vol. 8, no. 5, SEPTEMBER/OCTOBER 2011
[8]Swarup Kumar Mitra, Mrinal Kanti Naskar, “Comparative Study of Radio Models for data Gathering in Wireless Sensor Network,” International Journal of Computer Applications (0975 – 8887), Volume 27– No.4, pp. 49-57, August 2011
[9]Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan, “Energy-Efficient Communication Protocol for Wireless Sensor Networks,”Proceedings of the Hawaii International Conference on System Sciences, January 4-7, 2000.
[10]Shahzad, Khurram; Ali, Arshad; Gohar, N. D., ETSP: An Energy-efficient Time Synchronization Protocol on Wireless Sensor Networks. (2008). IEEE 22nd International Conference on Advanced Information Networking and Applications (22ndIEEE AINA), Okinawa, Japan.
[11]Neenu George, T.K.Parani, "Detection of Node Clones in Wireless Sensor Network Using Detection Protocols," IJETT, vol.8, no.6, pp.286-291, 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group.
[12]Zhijun Li, Guang Gong, "DHT-Based Detection of Node Clone in Wireless Sensor Networks," Ad Hoc Networks, LNICST 28. ISBN 978-3-642-11722-0. Springer Berlin Heidelberg, p. 240-255, 2010.
[13]Malika BELKADI, Rachida AOUDJIT, Mehammed DAOUI, Mustapha LALAM, "Energy-efficient Secure Directed Diffusion Protocol for Wireless Sensor Networks", IJITCS, vol.6, no.1, pp.50-56, 2014. DOI: 10.5815/ijitcs.2014.01.06
[14]Louazani Ahmed, Sekhri Larbi, Kechar Bouabdellah,"A Security Scheme against Wormhole Attack in MAC Layer for Delay Sensitive Wireless Sensor Networks", IJITCS, vol.6, no.12, pp.1-10, 2014. DOI: 10.5815/ijitcs.2014.12.01
[15]Er. Gurjot Singh, Er. Sandeep Kaur Dhanda,"Quality of Service Enhancement of Wireless Sensor Network Using Symmetric Key Cryptographic Schemes", IJITCS, vol.6, no.8, pp.32-42, 2014. DOI: 10.5815/ijitcs.2014.08.05